Sciweavers

1 search results - page 1 / 1
» Statistical Attack on RC4 - Distinguishing WPA
Sort
View
SACRYPT
2007
Springer
145views Cryptology» more  SACRYPT 2007»
13 years 10 months ago
Passive-Only Key Recovery Attacks on RC4
Abstract. We present several weaknesses in the key scheduling algorithm of RC4 when the secret key contains an initialization vector – a cryptographic scheme typically used by th...
Serge Vaudenay, Martin Vuagnoux